EasyManuals Logo
Home>Intel>Network Card>4965AGN

Intel 4965AGN User Manual

Intel 4965AGN
191 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #140 background imageLoading...
Page #140 background image
NOTE: WPA-Personal and WPA2-Personal are not interoperable.
AES-CCMP - (Advanced Encryption Standard - Counter CBC-MAC Protocol) The new
method for privacy protection of wireless transmissions specified in the IEEE 802.11i
standard. AES-CCMP provides a stronger encryption method than TKIP. Choose AES-
CCMP as the data encryption method whenever strong data protection is important.
NOTE: Some security solutions may not be supported by your
computer’s operating system and may require additional software or
hardware as well as wireless LAN infrastructure support. Check with
your computer manufacturer for details.
TKIP (Temporal Key Integrity Protocol) is an enhancement to WEP (Wired
Equivalent Privacy) security. TKIP provides per-packet key mixing, a message
integrity check and a rekeying mechanism, which fixes the flaws of WEP.
TLS
A type of authentication method using the Extensible Authentication Protocol (EAP)
and a security protocol called the Transport Layer Security (TLS). EAP-TLS uses
certificates which use passwords. EAP-TLS authentication supports dynamic WEP
key management. The TLS protocol is intended to secure and authenticate
communications across a public network through data encryption. The TLS
Handshake Protocol allows the server and client to provide mutual authentication
and to negotiate an encryption algorithm and cryptographic keys before data is
transmitted.
TTLS
These settings define the protocol and the credentials used to authenticate a user.
In TTLS (Tunneled Transport Layer Security), the client uses EAP-TLS to validate the
server and create a TLS-encrypted channel between the client and server. The client
can use another authentication protocol, typically password-based protocols, as MD5
Challenge over this encrypted channel to enable server validation. The challenge
and response packets are sent over a non-exposed TLS encrypted channel. TTLS
implementations today support all methods defined by EAP, as well as several older
methods (PAP, CHAP, MS-CHAP and MS-CHAPv2). TTLS can easily be extended to
work with new protocols by defining new attributes to support new protocols.
Authentication Protocols
PAP: Password Authentication Protocol is a two way handshake protocol

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Intel 4965AGN and is the answer not in the manual?

Intel 4965AGN Specifications

General IconGeneral
BrandIntel
Model4965AGN
CategoryNetwork Card
LanguageEnglish

Related product manuals